cyberstruggle / chalumeauLinks
Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.
☆102Updated 4 years ago
Alternatives and similar repositories for chalumeau
Users that are interested in chalumeau are comparing it to the libraries listed below
Sorting:
- ☆47Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆85Updated 2 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- ☆67Updated 6 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Updated 2 years ago
- REST API backend for Reconmap☆46Updated this week
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- Anonymize your hashcat formatted files for online cracking☆30Updated 7 months ago
- Brute-force Cisco SSL VPN☆58Updated 5 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- ☆54Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- OSWE Preparation☆37Updated 6 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago